Dissertationen zum Thema „Link codes“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Link codes" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Koromilas, Ioannis. „Performance analysis of the link-16/JTIDS waveform with concatenated coding“. Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKoromilas.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Robertson, Ralph C. "September 2009." Description based on title screen as viewed on 5 November 2009. Author(s) subject terms: Link-16/JTIDS, Reed-Solomon (RS) coding, Cyclic Code-Shift Keying (CCSK), Minimum-Shift Keying (MSK), convolutional codes, concatenated codes, perfect side information (PSI), Pulsed-Noise Interference (PNI), Additive White Gaussian Noise (AWGN), coherent detection, noncoherent detection. Includes bibliographical references (p. 79). Also available in print.
Kagioglidis, Ioannis. „Performance analysis of a LINK-16/JTIDS compatible waveform with noncoherent detection, diversity and side information“. Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKagioglidis%5FECE.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Robertson, R. Clark. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Link-16/JTIDS, (31, 15) Reed-Solomon (RS) coding, 32-ary Orthogonal signaling, Additive White Gaussian Noise (AWGN), Pulse-Noise Interference (PNI), Perfect Side Information (PSI). Includes bibliographical references (p. 49-51). Also available in print.
Bayley, Gwain. „PC-based bit error rate analyser for a 2 Mbps data link“. Thesis, University of Cape Town, 1988. http://hdl.handle.net/11427/23153.
Der volle Inhalt der QuelleFairhurst, Godred. „A study of error control techniques and the use of an enhanced X.25 LAPB protocol on a pseudo-random frequency-hopped anti-jam satellite link“. Thesis, University of Aberdeen, 1987. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=129205.
Der volle Inhalt der QuelleHorský, Tomáš. „Rozšíření optického vláknového přenosového systému“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442378.
Der volle Inhalt der QuelleAbdulwahid, Khalid. „Optimal decoding for line codes“. Thesis, University of Essex, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.253980.
Der volle Inhalt der QuelleRutherford, Carrie Grace. „Matroids, codes and their polynomial links“. Thesis, Queen Mary, University of London, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271434.
Der volle Inhalt der QuelleMhamdi, Maroua. „Méthodes de transmission d'images optimisées utilisant des techniques de communication numériques avancées pour les systèmes multi-antennes“. Thesis, Poitiers, 2017. http://www.theses.fr/2017POIT2281/document.
Der volle Inhalt der QuelleThis work is devoted to improve the coding/ decoding performance of a transmission scheme over noisy and realistic channels. For this purpose, we propose the development of optimized image transmission methods by focusing on both application and physical layers of wireless networks. In order to ensure a better quality of services, efficient compression algorithms (JPEG2000 and JPWL) are used in terms of the application layer enabling the receiver to reconstruct the images with maximum fidelity. Furthermore, to insure a transmission on wireless channels with a minimum BER at reception, some transmission, coding and advanced modulation techniques are used in the physical layer (MIMO-OFDM system, adaptive modulation, FEC, etc). First, we propose a robust transmission system of JPWL encoded images integrating a joint source-channel decoding scheme based on soft input decoding techniques. Next, the optimization of an image transmission scheme on a realistic MIMO-OFDM channel is considered. The optimized image transmission strategy is based on soft input decoding techniques and a link adaptation approach. The proposed transmission scheme offers the possibility of jointly implementing, UEP, UPA, adaptive modulation, adaptive source coding and joint decoding strategies, in order to improve the image visual quality at the reception. Then, we propose a robust transmission system for embedded bit streams based on concatenated block coding mechanism offering an unequal error protection strategy. Thus, the novelty of this study consists in proposing efficient solutions for the global optimization of wireless communication system to improve transmission quality
Bockelmann, Carsten [Verfasser]. „Robust Link Adaptation in Coded OFDM Systems / Carsten Bockelmann“. Aachen : Shaker, 2012. http://d-nb.info/106904671X/34.
Der volle Inhalt der QuelleMatrakidis, Chris. „Error control coding for constrained channels“. Thesis, University College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.324963.
Der volle Inhalt der QuelleHIROMOTO, MARIA Y. K. „PSINCO-um programa para calculo da distribuicao de potencia e supervisao do nucleo de reatores nucleares, utilizando sinais de detetores tipo 'SPD'“. reponame:Repositório Institucional do IPEN, 1998. http://repositorio.ipen.br:8080/xmlui/handle/123456789/10706.
Der volle Inhalt der QuelleMade available in DSpace on 2014-10-09T13:56:31Z (GMT). No. of bitstreams: 1 06442.pdf: 6689802 bytes, checksum: 46ba1e2b896e77a4288d24e80ac804ff (MD5)
Dissertacao (Mestrado)
IPEN/D
Instituto de Pesquisas Energeticas e Nucleares - IPEN/CNEN-SP
Czernin, Martin. „Das Breviarium Monasticum Codex 290 (183) der OÖ. Landesbibliothek in Linz“. Tutzing Schneider, 1992. http://deposit.ddb.de/cgi-bin/dokserv?id=2801086&prov=M&dok_var=1&dok_ext=htm.
Der volle Inhalt der QuelleMcKown, Kenneth J. „Implementation of a fiber-optic code-division multiple access data link“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA303225.
Der volle Inhalt der QuelleKumwenda, Khumbo. „Codes, graphs and designs related to iterated line graphs of complete graphs“. Thesis, University of the Western Cape, 2011. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_1742_1320645699.
Der volle Inhalt der QuellePetkov, Georgy Penchev. „A unified approach to the analysis and design of digital line codes“. Thesis, City University London, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.332860.
Der volle Inhalt der QuelleQuinn, Ciara. „Lonely cores : molecular line observations of isolated star formation“. Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/57749/.
Der volle Inhalt der QuelleXu, Zhiyu. „Blind and group-blind multiuser detectors for reverse link in DS-CDMA systems /“. View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202002%20XU.
Der volle Inhalt der QuelleIncludes bibliographical references (leaves 111-117). Also available in electronic version. Access restricted to campus users.
Dan, Wu. „Improvement for LDPC Coded OFDM Communication System over Power Line“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-128177.
Der volle Inhalt der QuelleScholz, Jason B. „Real-time performance estimation and optimizaton of digital communication links /“. Title page, contents and abstract only, 1992. http://web4.library.adelaide.edu.au/theses/09PH/09phs368.pdf.
Der volle Inhalt der QuelleOza, Maulik D. „Performance Analysis of Turbo Coded Waveforms and Link Budget Analysis (LBA) based Range Estimation over Terrain Blockage“. University of Toledo / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1278524750.
Der volle Inhalt der QuelleLampow-Maundy, Helen Ann. „The design and analysis of a frame alignment algorithm applicable to guided scrambling line codes“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ31600.pdf.
Der volle Inhalt der QuelleLeathers, Jane M. „CRACKING THE LINZ CIRCLE'S SECRET CODES: A SINGER'S GUIDE TO ALTERNATE INTERPRETATIONS OF SCHUBERT LIEDER“. Bowling Green State University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1151698767.
Der volle Inhalt der QuelleCzernin, Martin. „Das Breviarium Monasticum Codex 290 (183) der Oö. Landesbibliothek in Linz /“. Tutzing : H. Schneider, 2006. http://catalogue.bnf.fr/ark:/12148/cb41386921p.
Der volle Inhalt der QuelleBibliogr. p. 479-498.
Namburu, Visala. „Speech Coder using Line Spectral Frequencies of Cascaded Second Order Predictors“. Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/35670.
Der volle Inhalt der QuelleMaster of Science
Palmé, Michael, und Felix Toppar. „Line of Code Software Metrics Applied to Novice Software Engineers“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264120.
Der volle Inhalt der QuelleMenigen med detta arbete är att ta reda på hur tiden som läggs på ett mjukvaruprojekt distrubieras på en arbetsplats med nyutbildade mjukvaruingenjörer.Målet med detta arbete är att förbättra förståelsen angående hur nyutbildade mjukvaruingenjörer bidrar till ett mjukvaruprojekt.I det här arbetet så har en fallstudie gjorts med två stycken nyutbildade mjukvaruingenjörer för att undersöka hur nyutbildade ingenjörer bidrar till ett mjukvaruprojekt. Fallstudien följer dessa två ingenjörer på en arbetsplats där en kvantitativ undersökning görs med hjälp av Line of Code mjukvarumetriken som används för att dokumentera hur ingenjörerna fördelade sin tid på arbetsplatsen.Resultaten av fallstudien visade att dessa två nyutbildade ingenjörer spenderade mycket mer tid åt kodande än åt planerande, och att de skrev kod snabbare än den genomsnittliga erfarna ingenjören.
Rahmatdoustbeilankouh, Bahram. „Communication link and code conversion between Vehicle and smartphone for low speed semi-autonomous maneuvering“. Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-26588.
Der volle Inhalt der QuelleMaamar, Ali Hussein. „A 32-bit self-checking RISC processor using Dong's Code“. Thesis, University of Newcastle Upon Tyne, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285335.
Der volle Inhalt der QuelleLuna, Ricardo, und Hrishikesh Tapse. „An Analysis on the Coverage Distance of LDPC-Coded Free-Space Optical Links“. International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606240.
Der volle Inhalt der QuelleWe design irregular Low-Density Parity-Check (LDPC) codes for free-space optical (FSO) channels for different transmitter-receiver link distances and analyze the error performance for different atmospheric conditions. The design considers atmospheric absorption, laser beam divergence, and random intensity fluctuations due to atmospheric turbulence. It is found that, for the same transmit power, a system using the designed codes works over much longer link distances than a system that employs regular LDPC codes. Our analysis is particularly useful for portable optical transceivers and mobile links.
Ren, Manling. „Algorithms for off-line recognition of Chinese characters“. Thesis, Nottingham Trent University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.245175.
Der volle Inhalt der QuelleNing, Baozhu. „Performance Analysis of Iterative Soft Interference Cancellation Algorithms and New Link Adaptation Strategies for Coded MIMO Systems“. Thesis, Supélec, 2013. http://www.theses.fr/2013SUPL0034/document.
Der volle Inhalt der QuelleCurrent wireless communication systems evolve toward an enhanced reactivity of Radio Resource Management (RRM) and Fast Link Adaptation (FLA) protocols in order to jointly optimize the Media Access Control (MAC) and Physical (PHY) layers. In parallel, multiple antenna technology and advanced turbo receivers have a large potential to increase the spectral efficiency of future wireless communication system. These two trends, namely, cross layer optimization and turbo processing, call for the development of new PHY-layer abstractions (also called performance prediction method) that can capture the iterative receiver performance per iteration to enable the smooth introduction of such advanced receivers within FLA and RRM. The PhD thesis first revisits in detail the architecture of the turbo receiver, more particularly, the class of iterative Linear Minimum Mean-Square Error (soft) Interference Cancellation (LMMSE-IC) algorithms. Then, a semi-analytical performance prediction method is proposed to analyze its evolution through the stochastic modeling of each of the components. Intrinsically, the performance prediction method is conditional on the available Channel State Information at Receiver (CSIR), the type of channel coding (convolutional code or turbo code), the number of codewords and the type of Log Likelihood Ratios (LLR) on coded bits fed back from the decoder for interference reconstruction and cancellation inside the iterative LMMSE-IC algorithms. In the second part, closed-loop FLA in coded MIMO systems based on the proposed PHY-layer abstractions for iterative LMMSE-IC receiver have been tackled. The proposed link adaptation scheme relies on a low rate feedback and operates joint spatial precoder selection (e.g., antenna selection) and Modulation and Coding Scheme (MCS) selection so as to maximize the average rate subject to a target block error rate constraint. The cross antenna coding (the transmitter employs a Space-Time Bit-Interleaved Coded Modulation (STBICM) ) and per antenna coding (Each antenna employs an independent Bit-Interleaved Coded Modulation(BICM)) cases are both considered. The simulations clearly show the significant gain obtained with turbo receivers compared to that of a conventional MMSE receiver
Wickberg, Fredrik. „HDL code analysis for ASICs in mobile systems“. Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9762.
Der volle Inhalt der QuelleThe complex work of designing new ASICs today and the increasing costs of time to market (TTM) delays are putting high responsibility on the research and development teams to make fault free designs. The main purpose of implementing a static rule checking tool in the design flow today is to find errors and bugs in the hardware definition language (HDL) code as fast and soon as possible. The sooner you find a bug in the design, the shorter the turnaround time becomes, and thereby both time and money will be saved.
There are a couple of tools in the market that performs static HDL analysis and they vary in both price and functionality. In this project mainly Atrenta Spyglass was evaluated but similar tools were also evaluated for comparison purpose.
The purpose of this master thesis was to evaluate the need of implementing a rule checking tool in the design flow at the Digital ASIC department PDU Base Station development in Kista, who also was the commissioner for this project. Based on the findings in this project it is recommended that a static rule checking tool is introduced in the design flow at the ASIC department. However, in order to determine which of the different tools the following pointers should be regarded:
• If the tool is only going to be used as for lint checks (elementary structure and code checks) on RTL, then the implementation of Mentors Design Checker is advised.
• If the tool is going to be used for more sophisticated structural checks, clock tree/reset tree propagation, code checks, basic constraints checks, basic Clock Domain Crossings (CDC) checks, then Synopsys LEDA is advised.
• If the tool is going to be used as for advanced structural checks, extensive clock tree/reset tree propagation, code checks, constraints checks, functional Design For Test (DFT) checks (as testmode signal propagation) and functional CDC checks on RTL as well as on netlist level, then Atrenta Spyglass is advised.
The areas regarding checks that could be of interest for Ericsson is believed to be regular lint checks for RTL (naming, code and basic structure), clock/reset tree propagation (netlist and RTL), constraints and functional DFT checks (netlist and RTL).
Andre, John W. „Feasibility study of implementing a code division multiple access data link utilizing fiber optic delay lines“. Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23899.
Der volle Inhalt der QuelleFranková, Anna. „MY CODE/WORLD“. Master's thesis, Vysoké učení technické v Brně. Fakulta výtvarných umění, 2017. http://www.nusl.cz/ntk/nusl-316051.
Der volle Inhalt der QuelleChapman, David. „Dark signalling and code division multiple access in an optical fibre LAN with a bus topology“. Thesis, Open University, 2002. http://oro.open.ac.uk/22800/.
Der volle Inhalt der QuelleThompson, Mark Anthony. „Hot cores and HII regions : molecular line and continuum observations of massive star formation“. Thesis, University of Kent, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.298097.
Der volle Inhalt der QuelleLapinski, Richard Allen. „A case study to determine the feasibility of on-line ink jet printing of bar codes onto corrugated shipping containers /“. Online version of thesis, 1995. http://hdl.handle.net/1850/12226.
Der volle Inhalt der QuelleMeißner, Christian. „Entwicklung von dynamischen Bibliotheken (DLL) für Mathcad : Effizienzsteigerung, Quellcodeschutz, Codeportierung“. Universitätsbibliothek Chemnitz, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200900826.
Der volle Inhalt der QuelleOne advantage of Mathcad® is the well arranged worksheet. Mathematic equations are not displayed in confusing chains of characters but in clear mathematical notation. The equations normaly are checked of plausibility including units after writing. Many functions - even complex solving algorithms - are already defined. Furthermore formatted comments lead to a good documentation, e.g. for calculation reports. Hence the calculation sheets are developed in a very short time and they are easy to comprehend for new users. However every advantage is bought by a disadvantage. Therefore there is a less calculation speed, limited possibilities for code protection and only few possibilities of communication with other programs. These disadvantages can be removed by using dynamic link libraries (DLL's). This article gives an introduction of programming DLL's in Mathcad® and shows some examples to increase calculation efficiency, code protection and code transfer
Duée, Cédric, Beate Orberger, Nicolas Maubec, Xavier Bourrat, Mendili Yassine El, Stéphanie Gascoin, Daniel Chateigner et al. „Challenges in coupled on-line-on-mine-real time mineralogical and chemical analyses on drill cores“. TU Bergakademie Freiberg, 2017. https://tubaf.qucosa.de/id/qucosa%3A23177.
Der volle Inhalt der QuelleDuée, Cédric, Beate Orberger, Nicolas Maubec, Xavier Bourrat, Mendili Yassine El, Stéphanie Gascoin, Daniel Chateigner et al. „Challenges in coupled on-line-on-mine-real time mineralogical and chemical analyses on drill cores“. Technische Universitaet Bergakademie Freiberg Universitaetsbibliothek "Georgius Agricola", 2018. http://nbn-resolving.de/urn:nbn:de:bsz:105-qucosa-231144.
Der volle Inhalt der QuelleMácha, Tomáš. „Využití nástroje MATLAB Coder pro automatické generování C kódu pro mikrokontroléry dsPIC“. Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2019. http://www.nusl.cz/ntk/nusl-402535.
Der volle Inhalt der QuelleMorozov, Alexei. „Optimierung von Fehlererkennungsschaltungen auf der Grundlage von komplementären Ergänzungen für 1-aus-3 und Berger Codes“. Phd thesis, Universität Potsdam, 2005. http://opus.kobv.de/ubp/volltexte/2005/536/.
Der volle Inhalt der QuelleIn this dissertation concurrent checking by use of a complementary circuit for an 1-out-of-n Codes and Berger-Code is investigated. For an arbitrarily given combinational circuit necessary and sufficient conditions for the existence of a totally self-checking checker are derived for the first time.
Nascimento, Leandro Marques do. „Cores assets development in software product lines - towards a practical approach for the mobile game domain“. Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/1683.
Der volle Inhalt der QuelleOs mais almejados objetivos da engenharia de software são basicamente alta produtividade, com alta qualidade a um baixo custo e uma possível forma de atingi-los é estabelecer reuso de software o processo de criar sistemas de software a partir de sistemas existentes ao invés de criar do início. Neste contexto, uma abordagem que pode habilitar reuso na prática é Linha de Produto de Software (LPS) um conjunto de sistemas de software que compartilham um conjunto comum e gerenciado de funcionalidades que satisfazem uma necessidade específica de um domínio, e que são desenvolvidas a partir de um conjunto de artefatos reusáveis. Um domínio em particular onde a adoção de tal abordagem pode trazer benefícios é o domínio de jogos móveis principalmente porque os jogos precisam executar em diversos dispositivos e existe uma grande quantidade de jogos do mesmo tipo sendo desenvolvidos com funcionalidades em comum. Entretanto, as características do domínio de jogos móveis geralmente criam barreiras para os processos de LPS na prática, tais como, restrições de memória e de tamanho da aplicação e diferentes implementações de API feitas por diferentes fabricantes. Além disso, os atuais processos de LPS ainda carecem de detalhes em fases relacionadas à implementação de artefatos reusáveis, dificultando a administração apropriada das características mencionadas. Dessa forma, este trabalho objetiva definir uma abordagem prática para implementação de artefatos reusáveis em uma LPS para o domínio de jogos móveis com base nas boas práticas do estado da arte na área. Além disso, com a intenção de avaliar a abordagem, um estudo experimental foi executado com três jogos de plataforma para construir a LPS e um quarto jogo foi derivado dela
Anderson, Christopher R. „Evaluation of gigabit links for use in HEP trigger processing“. Thesis, University of Liverpool, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.367118.
Der volle Inhalt der QuelleMcLellan, James A. H. „Malay-English language alternation in two Brunei Darussalam on-line discussion forums“. Curtin University of Technology, Department of Language and Intercultural Education, 2005. http://espace.library.curtin.edu.au:80/R/?func=dbin-jump-full&object_id=16277.
Der volle Inhalt der QuelleMany of these display an asymmetric alternation pattern, in which one language supplies the grammar and the other the lexis, but there are also examples of equal alternation, where Malay and English both contribute to the grammar and to the lexis. The reasons for these choices are investigated through a questionnaire survey, which includes a text ranking task, and through other published texts in which Bruneians discuss their use of language. Chapter 5 discusses these findings, and the concluding Chapter 6 considers connections between the analysis of the texts and the questionnaire survey, especially the preference for monolingual English. Chapter 6 also includes discussion of questions of identity as reflected in the language choices and of language use in the CMC domain.
Brabec, Martin. „Spolupráce leteckých společností“. Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-73879.
Der volle Inhalt der QuellePiolho, Francisco de Assis Pereira. „Fases e criticalidade no modelo ashkin - teller de tr?s cores“. Universidade Federal do Rio Grande do Norte, 2007. http://repositorio.ufrn.br:8080/jspui/handle/123456789/16544.
Der volle Inhalt der QuelleThe usual Ashkin-Teller (AT) model is obtained as a superposition of two Ising models coupled through a four-spin interaction term. In two dimension the AT model displays a line of fixed points along which the exponents vary continuously. On this line the model becomes soluble via a mapping onto the Baxter model. Such richness of multicritical behavior led Grest and Widom to introduce the N-color Ashkin-Teller model (N-AT). Those authors made an extensive analysis of the model thus introduced both in the isotropic as well as in the anisotropic cases by several analytical and computational methods. In the present work we define a more general version of the 3-color Ashkin-Teller model by introducing a 6-spin interaction term. We investigate the corresponding symmetry structure presented by our model in conjunction with an analysis of possible phase diagrams obtained by real space renormalization group techniques. The phase diagram are obtained at finite temperature in the region where the ferromagnetic behavior is predominant. Through the use of the transmissivities concepts we obtain the recursion relations in some periodical as well as aperiodic hierarchical lattices. In a first analysis we initially consider the two-color Ashkin-Teller model in order to obtain some results with could be used as a guide to our main purpose. In the anisotropic case the model was previously studied on the Wheatstone bridge by Claudionor Bezerra in his Master Degree dissertation. By using more appropriated computational resources we obtained isomorphic critical surfaces described in Bezerra's work but not properly identified. Besides, we also analyzed the isotropic version in an aperiodic hierarchical lattice, and we showed how the geometric fluctuations are affected by such aperiodicity and its consequences in the corresponding critical behavior. Those analysis were carried out by the use of appropriated definitions of transmissivities. Finally, we considered the modified 3-AT model with a 6-spin couplings. With the inclusion of such term the model becomes more attractive from the symmetry point of view. For some hierarchical lattices we derived general recursion relations in the anisotropic version of the model (3-AAT), from which case we can obtain the corresponding equations for the isotropic version (3-IAT). The 3-IAT was studied extensively in the whole region where the ferromagnetic couplings are dominant. The fixed points and the respective critical exponents were determined. By analyzing the attraction basins of such fixed points we were able to find the three-parameter phase diagram (temperature ? 4-spin coupling ? 6-spin coupling). We could identify fixed points corresponding to the universality class of Ising and 4- and 8-state Potts model. We also obtained a fixed point which seems to be a sort of reminiscence of a 6-state Potts fixed point as well as a possible indication of the existence of a Baxter line. Some unstable fixed points which do not belong to any aforementioned q-state Potts universality class was also found
O modelo Ashkin-Teller (AT) usual consiste na superposi??o de dois modelos de Ising acoplados por um termo de intera??o de quatro spins. Em duas dimens?es o modelo AT apresenta uma linha de pontos fixos com expoentes cr?ticos variando continuamente, sobre a qual ele se torna sol?vel atrav?s de um mapeamento no modelo Baxter. Motivado por esta riqueza de comportamento multicr?tico em duas dimens?es, Grest e Widom introduziram e estudaram o modelo Ashkin-Teller de N cores (AT-N), nas vers?es anisotr?pica (AAT-N) e isotr?pica (IAT-N), atrav?s de v?rios m?todos anal?ticos e computacionais. Neste trabalho apresentamos uma vers?o mais geral do modelo Ashkin-Teller de 3 cores (AT-3) onde e introduzido um acoplamento de 6 spins. Estudamos o modelo atrav?s da an?lise da estrutura de suas simetrias, seguido de an?lises de poss?veis diagramas de fases determinados por t?cnicas de grupo de renormaliza??o no espa?o real. Esses diagramas s?o obtidos em temperatura finita na regi?o onde predomina o comportamento ferromagn?tico. Com o aux?lio do conceito de transmissividade obtemos as rela??es de recorr?ncia em redes hier?rquicas com liga??es peri?dicas e quasi-peri?dicas. Numa an?lise preliminar, consideramos inicialmente o modelo Ashkin-Teller de duas cores, a fim de obter resultados que possam servir de guia ao nosso objetivo principal. No caso anisotr?pico (AAT-2), o modelo foi tratado na Ponte de Wheatstone, conforme j? havia sido estudado por Claudionor Bezerra na sua disserta??o de mestrado. Usando ferramentas computacionais mais adequadas, encontramos superf?cies cr?ticas isomorfas previstas no trabalho citado, mas ainda n?o identificadas explicitamente. Al?m disso, analisamos a vers?o isotr?pica (IAT-2), em uma rede hier?rquica aperi?dica. Mostramos,neste caso, como a aperiodicidade da rede afeta as flutua??es geom?tricas, causando mudan?as no comportamento cr?tico do modelo. Essas an?lises foram feitas utilizando defini??es apropriadas de transmissividade. Em seguida passamos ao estudo do modelo Ashkin-Teller de 3 cores onde, al?m do acoplamento de 4 spins, introduzimos um acoplamento de 6 spins, que torna o modelo mais atraente do ponto de vista das simetrias que ele passa a apresentar. Calculamos rela??es de recorr?ncias gerais para o modelo na vers?o anisotr?pica (AAT-3), de onde podemos obter o caso particular do sistema isotr?pico (IAT-3), em certas redes hier?rquicas. A vers?o IAT-3 do modelo foi estudada detalhadamente na regi?o onde predominam as intera??es ferromagn?ticas. Determinamos os pontos fixos e respectivos expoentes cr?ticos. Analisando as bacias de atra??o desses pontos fixos, conseguimos obter o diagrama de fases tri-dimensional (temperatura ? acoplamento de quatro spins ? acoplamento de seis spins). Identificamos pontos fixos do tipo Ising e de Potts de 4 e de 8 estados, al?m de ind?cios de um ponto fixo reminiscente do Potts de 6 estados e uma possibilidade de uma linha de Baxter. Identificamos tamb?m pontos fixos cr?ticos inst?veis que n?o pertencem a nenhuma classe de universalidade identificada com o modelo de Potts q estados
Quénard, David. „Modélisation 3D de régions de formation d'étoiles : la contribution de l'interface graphique GASS aux codes de transfert radiatif“. Thesis, Toulouse 3, 2016. http://www.theses.fr/2016TOU30232/document.
Der volle Inhalt der QuelleThe era of interferometric observations leads to the need of a more and more precise description of physical structure and dynamics of star-forming regions, from pre-stellar cores to proto-planetary disks. The molecular and dust continuum emission can be described with multiple physical components. To compare with the observations, a precise and complex radiative transfer modelling of these regions is required. I have developed during this thesis a standalone application called GASS (Generator of Astrophysical Sources Structures, Quénard et al., submitted) for this purpose. Thanks to its interface, GASS allows to create, manipulate, and mix several different physical components such as spherical sources, disks, and outflows. In this thesis, I used GASS to work on different astrophysical cases and, among them, I studied in details the water and deuterated water emission in the pre-stellar core L1544 (Quénard et al., 2016) and the emission of ions in the low-mass proto-star IRAS16293-2422 (Quénard et al., submitted)
Aivaliotis, Theodoros. „Performance analysis of a JTIDS/link-16-type waveform using 32-ary orthogonal signaling with 32 chip baseband waveforms and a concatenated code“. Thesis, Monterey, California: Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4472.
Der volle Inhalt der QuelleThe Joint Tactical Information Distribution System (JTIDS)) is a hybrid frequency-hopped, direct sequence spread spectrum system which used cyclic code-shift keying (CCFK) for M-ary symbol modulation and minimum shift-keying (MSK) for chip modulation. In addition JTIDS uses a (31, 15) Reed Solomon (RS) code for channel coding. In this thesis an alternative waveform consistent with the original JTIDS waveform is analyzed. The system to be considered uses a concatenated code consisting of a (31, k) Reed Solomon inner code and a 4/5 convolutional outer code. The coded symbols are transmitted on the in-phase (I) and quadrature (Q) components of the carrier using 32-ary orthogonal signaling with 32 chip basedband waveforms such as Walsh functions. Performance with both coherent and noncoherent detection is analyzed. For noncoherent detection only one five bit symbol is transmitted on the I and Q components of the carrier per symbol duration, so the data throughput for noncoherent detection 1/2 that of coherent detection. No diversity, consistent with JTIDS single-pulse structure, and a sequential diversity of two, consistent with JTIDS double-pulse structure, are both considered. For the double-pulse structure, performance is examined both for the case of linear soft diversity combining and also for soft diversity combining with perfectside information. Performance is examined for both AWGN only, as well as for AWGN and pulse-noise interference. Based on the results of this thesis, the proposed waveform is found to outperform the existing JTIDS/Link-16 waveform in all cases considered in this research. Indeed, the best performance for the atlernative waveform is obtained when an (31, 25) RD inner code is used. When only AWGN is present, the proposed waveform with no diversity has a gain of 2.6 dB and 2.5 dB as compared to the existing JTIDS/Link-16 wavefoorm for coherent and noncoherent demodulation, respectively, when Pb =10-5. Likewise in an AGWN only environment with a diversity of two, the proposed waveform outperforms the existing JTIDS/Link-16 waveform by 3.15 dB and 23 dB for coherent and noncoherent detection, respectively. When PNI is also present, the proposed waveform performs significantly better than the existing JTIDS waveform in all cases considered. Finally, the use of a concatenated code consisting of a (31, 25) RS inner code and a 4/5 convolutional outer code results in a 33% improvement in throughput as compared to the existing JTIDS/Link-16 waveform.
Tanaka, Pedro Sena. „Algoritmos eficientes para a detecção on-line do padrão floco em bancos de dados de trajetórias“. Universidade Estadual de Londrina. Centro de Ciências Exatas. Programa de Pós-Graduação em Ciência da Computação, 2016. http://www.bibliotecadigital.uel.br/document/?code=vtls000206562.
Der volle Inhalt der QuelleThe high availability, low cost and increasing usage of location-aware devices have increased the interest in the research of spatiotemporal patterns. The main goal in studying such patterns is to discover spatial relationships over time between moving objects. Recent articles have proposed a wide variety of such patterns, among them is the flock pattern. This pattern is defined as a set of moving objects with minimum size that stay together within a maximum distance for a continuous period of time. Typical application examples are monitoring and surveillance that both rely on efficiently identifying groups of suspicious people/vehicles in large spatiotemporal streaming data. Previous works proposed polynomial-time algorithms to the flock pattern problem with fixed time duration. This master thesis proposes a new online method, called PSI, which is an improved base method to discover flock patterns that applies the plane sweeping computational geometry technique along with binary signatures and inverted indexes. In addition to PSI,thiswork proposes an algorithm family also based in the baseline algorithm proposed in literature, namely BFE, as well as variations based in heuristics. All the methods proposed in the work were extensively evaluated using real and synthetic datasets and the obtained results show that the techniques proposed in this work generate high performance gains when applied to the problem of finding flock patterns. Lastly, in order to better understand the results and to indicate a the best and worse scenarios for the utilization of the techniques this work also includes a profound analysis of the relationship between results and data distribution, and other data characteristics.
Vávra, Jakub. „Šifrování telefonních hovorů“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235954.
Der volle Inhalt der Quelle